TWI505132B - Certification method and electronic device - Google Patents
Certification method and electronic device Download PDFInfo
- Publication number
- TWI505132B TWI505132B TW103123552A TW103123552A TWI505132B TW I505132 B TWI505132 B TW I505132B TW 103123552 A TW103123552 A TW 103123552A TW 103123552 A TW103123552 A TW 103123552A TW I505132 B TWI505132 B TW I505132B
- Authority
- TW
- Taiwan
- Prior art keywords
- electronic device
- code
- file
- reliable time
- reliable
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Electric Clocks (AREA)
- Computer And Data Communications (AREA)
Description
本發明係關於一種數位檔案認證建立與驗證方法,尤其係關於一種基於附加時間戳記的數位檔案認證建立與驗證方法。The invention relates to a method for establishing and verifying digital file authentication, in particular to a method for establishing and verifying digital file authentication based on additional time stamp.
近年來,網路科技發展迅速,資訊可以透過網路向全世界發送出去而不受任何限制。因此,一部發送裝置可以很輕易地透過電子郵件(E-Mail)、檔案傳輸協定(File Transfer Protocol,FTP)、簡訊、點對點網路(peer-to-peer,P2P)或其他的傳輸方式將數位檔案傳送到另一端的接收裝置。In recent years, Internet technology has developed rapidly, and information can be sent to the world through the Internet without any restrictions. Therefore, a transmitting device can easily transmit via E-mail, File Transfer Protocol (FTP), SMS, peer-to-peer (P2P) or other transmission methods. The digital file is transmitted to the receiving device at the other end.
雖然網路帶給人們方便,讓資訊可觸及這個世界的每個角落,且使得每個人都可以很便利的傳送資訊到任何角落,但是在傳送資訊的過程中卻很高的機會遭受其他人的攔截,而攔截訊息的人可能企圖去修改、重寫或變造資訊中數位檔案的數據,如此一來接收者可能被修改過的文件檔案所誤導。數位檔案可能包含了一些重要事件、商業機密或一些個人資訊的敏感內容(如:音訊紀錄資料、合約、交易明細等)。若當數位檔案遭受竄改而沒有發出通知給接收者,則接收者將暴露在非預期的資訊危險 當中。Although the Internet is convenient for people, it allows information to reach every corner of the world, and makes it easy for everyone to send information to any corner, but in the process of transmitting information, it has a high chance of being victimized by others. Intercepting, and the person intercepting the message may attempt to modify, rewrite or alter the data of the digital file in the information, so that the recipient may be misled by the modified file file. Digital files may contain sensitive content (such as audio recordings, contracts, transaction details, etc.) for important events, trade secrets or some personal information. If the digital file is tampered with without giving notice to the recipient, the recipient will be exposed to unintended information risks among.
因此,需要一種建立認證以及對應該認證之驗證方法,使接收到訊息的人可以確認由發送者發送過來的訊息是否為最原始且完整的檔案。Therefore, there is a need for an authentication method and an authentication method corresponding to the authentication so that the person receiving the message can confirm whether the message sent by the sender is the most original and complete file.
本發明主要係揭露一種數位檔案認證建立方法,該認證建立方法包含下列步驟:提供一可靠時間產生單元於一第一電子裝置;讀取該可靠時間產生單元,以產生一可靠時間戳記,並將該可靠時間戳記附加於一第一數位檔案之數據中;利用該第一數位檔案產生一第一代碼;藉由加密該第一代碼產生該第一數位檔案之一第一數位簽章;以及將該第一數位檔案與該第一數位簽章傳送至一第二電子裝置。The present invention mainly discloses a digital file authentication establishing method, the authentication establishing method comprising the steps of: providing a reliable time generating unit to a first electronic device; reading the reliable time generating unit to generate a reliable time stamp, and The reliable time stamp is appended to the data of the first digit file; generating a first code by using the first digit file; generating a first digit signature of the first digit file by encrypting the first code; The first digital file and the first digital signature are transmitted to a second electronic device.
本發明另揭露了一種電子裝置,其包含一可靠時間產生單元,用以產生並提供一可靠時間戳記;一處理模組,用以產生具有該可靠時間戳記之一數位檔案,其中該處理模組透過讀取該可靠時間產生單元獲得該可靠時間戳記,並將該可靠時間戳記附加於該數位檔案之數據中;以及一認證建立模組,電性連接該可靠時間產生單元與該處理模組,用以利用該數位檔案產生一代碼,以及藉由加密該代碼產生相關該數位檔案之一數位簽章。The present invention further discloses an electronic device including a reliable time generating unit for generating and providing a reliable time stamp; a processing module for generating a digital file having the reliable time stamp, wherein the processing module Obtaining the reliable time stamp by reading the reliable time generating unit, and attaching the reliable time stamp to the data of the digital file; and an authentication establishing module electrically connecting the reliable time generating unit and the processing module, A code for generating a code using the digital file, and generating a digital signature associated with the digital file by encrypting the code.
本發明更揭露了一種電子裝置,其包含一處理模組,用以接收一其他電子裝置之一數位檔案以及對應該數位檔案之一數位簽章;以及一驗證模組,電性連結該處理模組,該驗證模組包含:一代碼產生單元, 用以利用該數位檔案產生一第一代碼;一解密單元,用以解密該數位簽章以獲得一第二代碼;以及一比對單元,用以比對該第一代碼與該第二代碼,以驗證該數位檔案之原始性與完整性。The invention further discloses an electronic device, comprising: a processing module, configured to receive a digital file of one of the other electronic devices and a digital signature corresponding to the digital file; and a verification module electrically connecting the processing module Group, the verification module comprises: a code generating unit, Generating a first code by using the digital file; a decrypting unit for decrypting the digital signature to obtain a second code; and a comparing unit for comparing the first code with the second code, To verify the originality and integrity of the digital file.
300‧‧‧第一電子裝置300‧‧‧First electronic device
310‧‧‧可靠時間產生單元310‧‧‧Reliable time generating unit
320‧‧‧認證建立模組320‧‧‧Certificate building module
324‧‧‧代碼產生模組324‧‧‧ Code Generation Module
326‧‧‧加密模組326‧‧‧Encryption Module
340‧‧‧處理模組340‧‧‧Processing module
342‧‧‧通訊模組342‧‧‧Communication Module
400‧‧‧網際網路400‧‧‧Internet
500‧‧‧第二電子裝置500‧‧‧Second electronic device
520‧‧‧驗證模組520‧‧‧ verification module
522‧‧‧代碼產生模組522‧‧‧ Code Generation Module
524‧‧‧解密模組524‧‧‧Decryption module
526‧‧‧比對模組526‧‧‧ Alignment module
540‧‧‧處理模組540‧‧‧Processing module
542‧‧‧通訊模組542‧‧‧Communication Module
步驟S100~步驟S108Step S100~Step S108
步驟S200~步驟S206Step S200 to step S206
ABS_A‧‧‧第一代碼ABS_A‧‧‧ first code
ABS_B‧‧‧第二代碼ABS_B‧‧‧ second code
ABS_C‧‧‧第三代碼ABS_C‧‧‧ third code
FILE_o‧‧‧第一電子裝置所產生的原始數位檔案FILE_o‧‧‧The original digital file generated by the first electronic device
FILE_r‧‧‧第二電子裝置接收到的數位檔案FILE_r‧‧‧Digital files received by the second electronic device
F_Data‧‧‧原始數位檔案中的數據F_Data‧‧‧data in the original digital file
F_Data’‧‧‧第二電子裝置接收到之數位檔案中的數據F_Data’‧‧‧data from the digital file received by the second electronic device
HEAD‧‧‧原始標頭資訊HEAD‧‧‧Original header information
HEAD’‧‧‧第二電子裝置接收到之數位檔案中的標頭資訊Header information in the digital file received by the HEAD’‧‧‧ second electronic device
RT‧‧‧原始可靠時間戳記RT‧‧‧ original reliable time stamp
RT’‧‧‧第二電子裝置接收到之數位檔案中的可靠時間戳記Reliable time stamp in the digital file received by the RT’‧‧‧ second electronic device
SIG‧‧‧數位簽章SIG‧‧‧ digital signature
請參閱以下有關本發明較佳實施例之詳細說明及其附圖,在本發明所屬領域中具有通常知識者將可進一步了解本發明之技術內容及目的、功效。The detailed description of the preferred embodiments of the present invention and the accompanying drawings, which are to be understood by those of ordinary skill in the art of
圖1A與圖1B 係為根據本發明之一實施例之數位檔案認證建立與驗證方法流程圖。1A and FIG. 1B are flowcharts of a digital file authentication establishment and verification method according to an embodiment of the present invention.
圖2 係為根據本發明之一實施例之數位檔案操作流程示意圖。2 is a schematic diagram showing the operation flow of a digital file according to an embodiment of the present invention.
圖3 係為根據本發明之一實施例之兩個電子裝置實施數位檔案認證建立與驗證方法之功能方塊圖。3 is a functional block diagram of a method for establishing and verifying a digital file authentication of two electronic devices according to an embodiment of the present invention.
請參閱圖1A、圖1B與圖2。圖1A與圖1B係為根據本發明之一實施例之數位檔案認證建立與驗證方法流程圖。圖2係為根據本發明之一實施例之數位檔案操作流程示意圖。Please refer to FIG. 1A, FIG. 1B and FIG. 2. 1A and FIG. 1B are flowcharts of a digital file authentication establishment and verification method according to an embodiment of the present invention. FIG. 2 is a schematic diagram showing the operation flow of a digital file according to an embodiment of the present invention.
在本實施例中,圖1A與圖1B所示之步驟係用以將自第一電子裝置(意即發送者)傳送到第二裝置(意即接收者)之數位檔案進行認證之建立與驗證的方法。對應為一發送者之第一電子裝置所進行之步驟如圖1A所 示,而對應為一接收者之第二電子裝置所進行之步驟如圖1B所示。In the present embodiment, the steps shown in FIG. 1A and FIG. 1B are used to establish and verify the authentication from the first electronic device (ie, the sender) to the digital file of the second device (ie, the recipient). Methods. The steps performed by the first electronic device corresponding to a sender are as shown in FIG. 1A. The steps performed by the second electronic device corresponding to a recipient are shown in FIG. 1B.
如圖1A與圖2所示,提供可靠時間產生單元給第一電子裝置如步驟S100。可靠時間產生單元係用以提供一可靠時間戳記。可靠時間產生單元可為第一電子裝置中的一個內部元件,或是外部的一個獨立元件。若可靠時間產生單元為第一電子裝置中的內部元件,則可透過網路/人造衛星與一參考時間伺服器做定期的時間比對並進行校正;若可靠時間產生單元為外部的獨立元件,則可透過有線或無線通訊的方式將所產生的可靠時間戳記傳送到第一電子裝置。欲了解可靠時間產生單元進一步的細節,後段將會有詳細的說明。As shown in FIG. 1A and FIG. 2, a reliable time generating unit is provided to the first electronic device as in step S100. The reliable time generating unit is used to provide a reliable time stamp. The reliable time generating unit can be an internal component in the first electronic device or a separate external component. If the reliable time generating unit is an internal component in the first electronic device, the network/satellite can be periodically time-aligned and corrected by a reference time server; if the reliable time generating unit is an external independent component, The generated reliable time stamp can be transmitted to the first electronic device through wired or wireless communication. Further details of the reliable time generation unit are provided in the following paragraphs.
當於第一電子裝置中產生數位檔案中的數據F_Data時,從可靠時間產生單元讀取一可靠時間RT(Real Time)做為戳記,並將可靠時間戳記RT附加於數位檔案FILE_o之中如步驟S102。換句話說,藉由讀取可靠時間產生單元來產生可靠時間戳記RT,並將該可靠時間戳記RT附加於數位檔案FILE_o中。在一些實施例中,可靠時間戳記RT可被附加於數位檔案FILE_o的標頭(header)之中。其中,數位檔案FILE_o可為音訊紀錄檔、視訊檔、文件檔或是任何類似的檔案(如具有標頭列以便紀錄可靠時間戳記RT的任何數位檔案)。在本實施例中,數位檔案FILE_o係以一音訊檔案做為舉例。在步驟S102之後,數位檔案可包含數據F_Data、原始標頭資訊HEAD(如ID3標籤)以及附加於數位檔案FILE_o標頭列之可靠時間戳記RT。When the data F_Data in the digital file is generated in the first electronic device, a reliable time RT (Real Time) is read from the reliable time generating unit as a stamp, and the reliable time stamp RT is added to the digital file FILE_o as steps S102. In other words, the reliable time stamp RT is generated by reading the reliable time generating unit, and the reliable time stamp RT is attached to the digital file FILE_o. In some embodiments, the reliable timestamp RT can be appended to the header of the digital file FILE_o. The digital file FILE_o can be an audio log file, a video file, a file file or any similar file (such as any digital file with a header column for recording a reliable time stamp RT). In this embodiment, the digital file FILE_o is exemplified by an audio file. After step S102, the digital file may contain data F_Data, original header information HEAD (such as ID3 tags), and a reliable time stamp RT appended to the digital file FILE_o header column.
當數位檔案的數據F_Data產生時,可靠時間戳記RT紀錄了精確的時間(如包含了年、月、日、時、分、秒,甚至是更細微的時間尺度等資訊)。因為時間的不可逆性,一個時間點不可能會出現兩個,如此一來時 間就可做為該數位檔案具有原始性(沒有被更改過)的證明,換句話說,在第一電子裝置上的可靠時間戳記係無法透過任何方式進行修改(如無法被使用者手動進行逆轉/設定/改變等)。When the data F_Data of the digital file is generated, the reliable time stamp RT records the precise time (such as including the year, month, day, hour, minute, second, and even a more subtle time scale). Because of the irreversibility of time, it is impossible to have two at a time, so that It can be used as proof that the digital file is original (not changed). In other words, the reliable time stamp on the first electronic device cannot be modified in any way (if it cannot be manually reversed by the user). /setting/changing, etc.).
在一實施例中,當讀取可靠時間戳記RT如步驟102以及當第一電子裝置具有與網際網路建立網路連線的能力時,更包含透過網路連線於網際網路上存取一參考時間伺服器(在這個例子中,參考時間伺服器可為一網路時間伺服器),並將該可靠時間產生單元與該參考時間伺服器的時間進行同步之步驟。In an embodiment, when the reliable time stamp RT is read, as in step 102, and when the first electronic device has the ability to establish a network connection with the Internet, it further includes accessing the Internet through the Internet. The reference time server (in this example, the reference time server can be a network time server) and the step of synchronizing the reliable time generating unit with the time of the reference time server.
在其他的實施例中,當讀取可靠時間戳記RT如步驟102以及當第一電子裝置具有全球定位功能時,更包含基於該全球定位功能下存取一參考時間伺服器(在這個例子中,參考時間伺服器可為一人造衛星上的計時器),並將該可靠時間產生單元與該參考時間伺服器進行時間同步之步驟。In other embodiments, when the reliable time stamp RT is read as in step 102 and when the first electronic device has a global positioning function, it further includes accessing a reference time server based on the global positioning function (in this example, The reference time server can be a timer on an artificial satellite and the time synchronization unit is synchronized with the reference time server.
在其他的實施例中,第一電子裝置更包含一電池,用以對可靠時間產生單元提供電力。當製造該電子裝置時,該可靠時間產生單元產生之該可靠時間戳記RT之時間係與一精確的官方時間同步,且可靠時間戳記RT係無法被修改(如藉由移除第一電子裝置韌體中時間設定功能)。In other embodiments, the first electronic device further includes a battery for providing power to the reliable time generating unit. When the electronic device is manufactured, the time of the reliable time stamp RT generated by the reliable time generating unit is synchronized with an accurate official time, and the reliable time stamp RT cannot be modified (eg, by removing the first electronic device toughness) Body time setting function).
之後,利用包含有可靠時間戳記RT的數位檔案FILE_o來產生第一代碼ABS_A如步驟S104。在本實施例中,步驟S104可藉由雜湊演算法(Hash algorithm)來產生第一代碼ABS_A。舉例來說,可由訊息摘要演算法第五版(Message-Digest Algorithm 5,MD5)、安全雜湊演算法-256(Secure Hash Algorithm-256,SHA-256)、安全雜湊演算法-384(Secure Hash Algorithm-384,SHA-384)、安全雜湊演算法-512(Secure Hash Algorithm-512,SHA-512)與循 環冗餘查核(Cyclic Redundancy Check-32,CRC32)之中挑選做為雜湊演算法。雜湊演算法係用以對龐大資料產生一組獨特的符號代碼。若輸入到雜湊演算法的數據是一樣的,則輸出的(代碼)會是同樣的。反之,若輸入到雜湊演算法中的兩筆數據只要有細微的不同,則透過雜湊演算法轉換出來的代碼就會是完全不同的兩種代碼。Thereafter, the first code ABS_A is generated using the digital file FILE_o including the reliable time stamp RT as in step S104. In this embodiment, step S104 may generate the first code ABS_A by a hash algorithm. For example, Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm-256 (SHA-256), Secure Hash Algorithm-384 (Secure Hash Algorithm) -384, SHA-384), Secure Hash Algorithm-512 (SHA-512) Among the Cyclic Redundancy Check-32 (CRC32), it is selected as a hash algorithm. The hash algorithm is used to generate a unique set of symbolic codes for large data. If the data entered into the hash algorithm is the same, the output (code) will be the same. On the other hand, if the two data input into the hash algorithm are slightly different, the code converted by the hash algorithm will be completely different.
之後,藉由加密第一代碼ABS_A產生數位檔案FILE_o之數位簽章SIG如步驟S106。舉例來說,可根據第一電子裝置之使用者所擁有的私鑰(Private Key),並基於RSA加密演算法(一種非對稱的加密演算法)加密第一代碼ABS_A,以產生數位簽章SIG。Thereafter, the digital signature SIG of the digital file FILE_o is generated by encrypting the first code ABS_A as in step S106. For example, the first code ABS_A may be encrypted according to a private key owned by a user of the first electronic device and based on an RSA encryption algorithm (an asymmetric encryption algorithm) to generate a digital signature SIG .
而後,將數位檔案FILE_o與數位簽章SIG一併傳送到第二電子裝置(如:接收者)如步驟S108。相對的來說,第二電子裝置係具有藉由數位簽章SIG’與包含在數位檔案FILE_r中的可靠時間戳記RT’來驗證數位檔案FILE_r原始性與完整性的能力。Then, the digital file FILE_o is transmitted to the second electronic device (e.g., the recipient) together with the digital signature SIG as in step S108. In contrast, the second electronic device has the ability to verify the authenticity and integrity of the digital file FILE_r by the digital signature SIG' and the reliable time stamp RT' contained in the digital file FILE_r.
如圖1B與圖2所示,第一電子裝置發送FILE_o與數位簽章SIG後,第二電子裝置所接收到的資訊為數位檔案FILE_r與數位簽章SIG’如步驟S200。As shown in FIG. 1B and FIG. 2, after the first electronic device sends the FILE_o and the digital signature SIG, the information received by the second electronic device is the digital file FILE_r and the digital signature SIG' as in step S200.
之後,自數位檔案FILE_r產生第二代碼ABS_B如步驟S202。Thereafter, the second code ABS_B is generated from the digital file FILE_r as in step S202.
值得注意的是,第一代碼ABS_A(產生方式請見步驟S104)與第二代碼ABS_B(產生方式請見步驟S202)係透過同一種演算法所產生。在本實施例中,第一代碼ABS_A與第二代碼ABS_B皆係透過同樣的雜湊演算法所產生。在這個例子中,若第二電子裝置所接收之數位檔案FILE_r仍為原本由第一電子裝置所產生的數位檔案FILE_o(未經任何修改),則第一代碼 ABS_A與第二代碼ABS_B會是兩個相同的代碼。若第二電子裝置所接收的數位檔案FILE_r不是原本的數位檔案FILE_o,則第一代碼ABS_A與第二代碼ABS_B將會是不同的兩個代碼,這是由於在數位檔案FILE_r中的可靠時間戳記RT’及/或數據F_Data’(甚至及/或原始標頭資訊HEAD’)與數位檔案FILE_o中的可靠時間戳記RT及/或數據F_Data(甚至及/或原始標頭資訊HEAD)是不一樣的。It should be noted that the first code ABS_A (see step S104 for generating mode) and the second code ABS_B (see step S202 for generating mode) are generated by the same algorithm. In this embodiment, the first code ABS_A and the second code ABS_B are generated by the same hash algorithm. In this example, if the digital file FILE_r received by the second electronic device is still the digital file FILE_o originally generated by the first electronic device (without any modification), the first code ABS_A and the second code ABS_B will be two identical codes. If the digital file FILE_r received by the second electronic device is not the original digital file FILE_o, the first code ABS_A and the second code ABS_B will be different codes, which is due to the reliable time stamp RT in the digital file FILE_r. 'and/or data F_Data' (even and/or original header information HEAD') is not the same as the reliable timestamp RT and/or data F_Data (and/or the original header information HEAD) in the digital file FILE_o.
而後,藉由解密數位簽章SIG’來產生並獲得一第三代碼ABS_C如步驟S204。在本實施例中,可根據第一電子裝置之使用者所擁有的公開鑰(Public Key),並基於RSA加密演算法解密數位簽章SIG’,以產生第三代碼ABS_C。Then, a third code ABS_C is generated and obtained by decrypting the digital signature SIG' as in step S204. In this embodiment, the digital signature SIG' may be decrypted based on the Public Key owned by the user of the first electronic device and based on the RSA encryption algorithm to generate the third code ABS_C.
對應私鑰之公開鑰可開放給任何人取得,如透過網路使任何人皆可取得。因此,第二裝置可獲得對應第一裝置私鑰之公開鑰,如此一來第二裝置可解密數位簽章SIG’。然而,第二裝置係無法獲得第一裝置之私鑰。因此第二裝置無法重製原本由第一電子裝置所建立的數位簽章SIG。在這個例子中,透過解密數位簽章SIG’所獲得的第三代碼ABS_C係與第一代碼ABS_A相同。The public key corresponding to the private key can be opened to anyone, such as making it available to anyone through the Internet. Therefore, the second device can obtain the public key corresponding to the first device private key, so that the second device can decrypt the digital signature SIG'. However, the second device is unable to obtain the private key of the first device. Therefore, the second device cannot reproduce the digital signature SIG originally created by the first electronic device. In this example, the third code ABS_C obtained by decrypting the digital signature SIG' is the same as the first code ABS_A.
之後,比對第二代碼ABS_B與第三代碼ABS_C來驗證第二電子裝置所接收到的數位檔案如步驟S206。若第二代碼ABS_B與第三代碼ABS_C相同,則數位檔案FILE_r仍為第一裝置所產生的原始數位檔案FILE_o(未經任何修改)。若第二代碼ABS_B與第三代碼ABS_C不相同,則第二電子裝置可發出通知並反應該情況(如傳送一報告至第一電子裝置、銷毀數位檔案FILE_r或其他的動作)。Thereafter, the second code ABS_B and the third code ABS_C are compared to verify the digital file received by the second electronic device as in step S206. If the second code ABS_B is the same as the third code ABS_C, the digital file FILE_r is still the original digital file FILE_o generated by the first device (without any modification). If the second code ABS_B is different from the third code ABS_C, the second electronic device can issue a notification and reflect the situation (such as transmitting a report to the first electronic device, destroying the digital file FILE_r or other actions).
在本實施例中,數位檔案FILE_o與FILE_r除了同樣具有數據外,還皆具有可靠時間戳記。即使有其他人複製了與數據F_Data完全一樣的數據,並將複製的數據F_Data放到其他的數位檔案FILE_d(未繪示於圖中),接收者(第二電子裝置)仍能可以辨識出數位檔案FILE_d並不是原本由第一電子裝置所產生的數位檔案FILE_o,這是由於數位檔案FILE_d與原始數位檔案FILE_o中所紀錄的可靠時間戳記RT並不相同。In this embodiment, the digital files FILE_o and FILE_r have reliable time stamps in addition to the same data. Even if someone else copies the same data as the data F_Data and puts the copied data F_Data into another digital file FILE_d (not shown), the receiver (second electronic device) can still recognize the digits. The file FILE_d is not the digital file FILE_o originally generated by the first electronic device, because the digital file FILE_d is not the same as the reliable time stamp RT recorded in the original digital file FILE_o.
請參閱圖3,係為根據本發明之一實施例之兩個電子裝置(第一電子裝置300與第二電子裝置500)實施數位檔案認證建立與驗證方法之功能方塊圖。由第一電子裝置300傳送到第二電子裝置500的數位檔案可基於先前之實施例來進行認證建立與之後的驗證。Please refer to FIG. 3, which is a functional block diagram of a digital file authentication establishment and verification method performed by two electronic devices (a first electronic device 300 and a second electronic device 500) according to an embodiment of the present invention. The digital file transmitted by the first electronic device 300 to the second electronic device 500 can be used for authentication establishment and subsequent verification based on the previous embodiments.
如圖3所示,第一電子裝置300(如實施例中所述的發送者)包括有可靠時間產生單元310、認證建立模組320與處理模組340。可靠時間產生單元310係用以提供可靠時間戳記。處理模組340用以產生數位檔案的數據。在本實施例中,當產生數位檔案時,處理單元會讀取可靠時間產生單元,以獲得可靠時間戳記,並將可靠時間戳記附加於數位檔案的數據之中。As shown in FIG. 3, the first electronic device 300 (such as the sender described in the embodiment) includes a reliable time generating unit 310, an authentication establishing module 320, and a processing module 340. The reliable time generating unit 310 is used to provide a reliable time stamp. The processing module 340 is configured to generate data of the digital file. In this embodiment, when a digital file is generated, the processing unit reads the reliable time generating unit to obtain a reliable time stamp and attaches a reliable time stamp to the data of the digital file.
第一電子裝置300可包含一通訊單元342,用以與網際網路建立網路連線。認證建立模組320係電性連結可靠時間產生單元310以及處理模組340。認證建立模組320可包含代碼產生單元324以及加密單元326。The first electronic device 300 can include a communication unit 342 for establishing an internet connection with the Internet. The authentication establishment module 320 is an electrical connection reliability time generation unit 310 and a processing module 340. The authentication establishment module 320 can include a code generation unit 324 and an encryption unit 326.
代碼產生單元324用以利用包含附加可靠時間戳記的數位檔案來產生代碼(產生的方式係透過雜湊演算法,像是MD5、SHA-1、SHA-256、SHA-384、SHA-512或CRC32)。加密單元326係用以藉由加密代碼(根據第一電子裝置300之使用者所擁有的私鑰)來產生數位檔案的數位簽章。透過網際 網路,數位簽章可隨著數位檔案一同被傳送到第二電子裝置500。The code generation unit 324 is configured to generate a code using a digital file containing an additional reliable time stamp (produced by a hash algorithm such as MD5, SHA-1, SHA-256, SHA-384, SHA-512 or CRC32). . The encryption unit 326 is configured to generate a digital signature of the digital file by encrypting the code (according to the private key owned by the user of the first electronic device 300). Through the internet The network, digital signature can be transmitted to the second electronic device 500 along with the digital file.
關於第一電子裝置300上可靠時間產生單元310與可靠時間戳記的操作、說明細節,於先前圖1A與圖2的實施例有詳細的說明,於此不再贅述。The operation and description details of the reliable time generating unit 310 and the reliable time stamp on the first electronic device 300 are described in detail in the previous embodiments of FIG. 1A and FIG. 2, and details are not described herein again.
如圖3所示,第二電子裝置500(如實施例所述之接收者)包含有驗證模組520以及處理模組540。第二電子裝置500更包含通訊模組542,用以與網際網路400建立網路連線。處理模組540用以接收來自第一電子裝置300的數位檔案以及對應的數位簽章。驗證模組520係電性連結處理模組540。驗證模組520包含代碼產生單元522、解密單元524以及比對單元526。代碼產生單元522係用以根據數位檔案來產生第二代碼(產生的方式係透過雜湊演算法,像是MD5、SHA-1、SHA-256、SHA-384、SHA-512或CRC32)。解密單元524係用以藉由解密數位簽章(根據對應該第一電子裝置300使用者所擁有之私鑰的公開鑰)來獲得一第三代碼。比對單元526係用以比對第二代碼與第三代碼,以驗證數位檔案的原始性與完整性。As shown in FIG. 3, the second electronic device 500 (the receiver as described in the embodiment) includes a verification module 520 and a processing module 540. The second electronic device 500 further includes a communication module 542 for establishing an internet connection with the Internet 400. The processing module 540 is configured to receive the digital file from the first electronic device 300 and the corresponding digital signature. The verification module 520 is an electrical connection processing module 540. The verification module 520 includes a code generation unit 522, a decryption unit 524, and a comparison unit 526. The code generation unit 522 is configured to generate the second code according to the digital file (produced by a hash algorithm such as MD5, SHA-1, SHA-256, SHA-384, SHA-512 or CRC32). The decryption unit 524 is configured to obtain a third code by decrypting the digital signature (according to the public key corresponding to the private key owned by the user of the first electronic device 300). The comparison unit 526 is for comparing the second code with the third code to verify the originality and integrity of the digital file.
第二電子裝置500的操作細節於先前圖1B與圖2相關的實施例中已說明,於此不再贅述。The operation details of the second electronic device 500 have been described in the previous embodiment related to FIG. 1B and FIG. 2, and details are not described herein again.
基於先前所述的實施例,本發明揭露了一種認證方法,藉由一可靠時間戳記來建立認證/驗證傳送於兩個不同裝置間的數位檔案。可靠時間戳記係無法被任何使用者所改變。因為時間的不可逆性,一個特定時間點不可能出現兩次,因此可用來做為原始數位檔案的證明。Based on the previously described embodiments, the present invention discloses an authentication method for establishing an authentication/verification transfer to a digital file between two different devices by means of a reliable time stamp. Reliable time stamps cannot be changed by any user. Because of the irreversibility of time, a specific point in time cannot occur twice, so it can be used as proof of the original digital file.
上列詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為 之等效實施或變更,均應包含於本發明之專利範圍之中。The detailed description above is a detailed description of one of the possible embodiments of the present invention, which is not intended to limit the scope of the invention, which is not Equivalent implementations or modifications are intended to be included within the scope of the invention.
ABS_A‧‧‧第一代碼ABS_A‧‧‧ first code
ABS_B‧‧‧第二代碼ABS_B‧‧‧ second code
ABS_C‧‧‧第三代碼ABS_C‧‧‧ third code
FILE_o‧‧‧第一電子裝置所產生的數位檔案FILE_o‧‧‧Digital files generated by the first electronic device
FILE_r‧‧‧第二電子裝置接收到的數位檔案FILE_r‧‧‧Digital files received by the second electronic device
F_Data‧‧‧數位檔案中的數據Data in the F_Data‧‧‧ digital file
HEAD‧‧‧原始標頭資訊HEAD‧‧‧Original header information
RT‧‧‧可靠時間戳記RT‧‧‧Reliable time stamp
SIG‧‧‧數位簽章SIG‧‧‧ digital signature
Claims (17)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/938,246 US20150019871A1 (en) | 2013-07-10 | 2013-07-10 | Certification method and electronic device |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201502852A TW201502852A (en) | 2015-01-16 |
TWI505132B true TWI505132B (en) | 2015-10-21 |
Family
ID=52278122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW103123552A TWI505132B (en) | 2013-07-10 | 2014-07-08 | Certification method and electronic device |
Country Status (2)
Country | Link |
---|---|
US (1) | US20150019871A1 (en) |
TW (1) | TWI505132B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108883631B (en) * | 2016-03-28 | 2020-10-30 | 惠普发展公司,有限责任合伙企业 | Dividing the printer discharge into dots |
CN106330945B (en) * | 2016-08-31 | 2020-04-24 | 北京信安世纪科技股份有限公司 | Digital certificate synchronization method, digital signature server and digital certificate synchronization system |
US10904292B1 (en) * | 2018-09-25 | 2021-01-26 | Amazon Technologies, Inc. | Secure data transfer device |
CN109858262B (en) * | 2019-01-17 | 2022-06-17 | 平安科技(深圳)有限公司 | Process approval method, device and system based on block chain system and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5828751A (en) * | 1996-04-08 | 1998-10-27 | Walker Asset Management Limited Partnership | Method and apparatus for secure measurement certification |
US7231044B2 (en) * | 2000-10-11 | 2007-06-12 | Digital Authentication Technologies, Inc. | Method and apparatus for real-time digital certification of electronic files and transactions using entropy factors |
TWI353765B (en) * | 2008-02-20 | 2011-12-01 | ||
US20130067219A1 (en) * | 2008-03-10 | 2013-03-14 | Secureauth Corporation | Configuring a valid duration period for a digital certificate |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8832783B2 (en) * | 2012-09-28 | 2014-09-09 | Intel Corporation | System and method for performing secure communications |
-
2013
- 2013-07-10 US US13/938,246 patent/US20150019871A1/en not_active Abandoned
-
2014
- 2014-07-08 TW TW103123552A patent/TWI505132B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5828751A (en) * | 1996-04-08 | 1998-10-27 | Walker Asset Management Limited Partnership | Method and apparatus for secure measurement certification |
US7231044B2 (en) * | 2000-10-11 | 2007-06-12 | Digital Authentication Technologies, Inc. | Method and apparatus for real-time digital certification of electronic files and transactions using entropy factors |
TWI353765B (en) * | 2008-02-20 | 2011-12-01 | ||
US20130067219A1 (en) * | 2008-03-10 | 2013-03-14 | Secureauth Corporation | Configuring a valid duration period for a digital certificate |
Also Published As
Publication number | Publication date |
---|---|
US20150019871A1 (en) | 2015-01-15 |
TW201502852A (en) | 2015-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11574379B2 (en) | System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval | |
US11868509B2 (en) | Method and arrangement for detecting digital content tampering | |
JP2018186550A (en) | Delay data access | |
US20140304512A1 (en) | Method and system for authenticating and preserving data within a secure data repository | |
JP5270894B2 (en) | Information processing apparatus, control method therefor, information processing system, and program | |
TWI505132B (en) | Certification method and electronic device | |
CN103905204A (en) | Data transmission method and transmission system | |
CN106330441A (en) | Method, equipment and system for processing trusted time information | |
CN111626731A (en) | Contract signing identity authentication and signature system based on block chain technology | |
JP5223860B2 (en) | Time information distribution system, time distribution station, terminal, time information distribution method and program | |
JP4210749B2 (en) | Electronic file authentication system, electronic file authentication server, and electronic file authentication method | |
JP2013157777A (en) | Information processing system and information processing method | |
TW201344487A (en) | Digital authentication control medium and digital terminal device having network communication function | |
JP6161737B2 (en) | System and method for verifying real-time time stamp created by digital time stamp device | |
TW201344486A (en) | Digital content security control medium, digital memory card, USB disk, and digital authentication terminal | |
JP2002281475A (en) | Image pickup device, server device and client device | |
JP2007006319A (en) | Key exchange system, terminal, and program | |
JP2014112773A (en) | Method and system for enhancing power of evidence of digital image information | |
WO2017130300A1 (en) | System and method for verifying real-time time stamp created by digital time stamp device | |
JP2004297299A (en) | Photographing information certification system and digital camera | |
JP2002072874A (en) | Signed sentence transmission device, signed sentence authentication device, and recording medium with program used for realizing those devices | |
TW201116024A (en) | System and method for automatically recovering encrypted key |